Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
BjLxqVU7m4.dll

Overview

General Information

Sample name:BjLxqVU7m4.dll
renamed because original name is a hash value
Original sample name:4b7a85411716775d966284e879a6bda87feade4c9f40cb94ade6e217793e8a84.exe
Analysis ID:1563002
MD5:bd804dfa6fafa1917f83060a30f7f1d0
SHA1:68cc23c6877806705588ceb6fec57d913a543c1d
SHA256:4b7a85411716775d966284e879a6bda87feade4c9f40cb94ade6e217793e8a84
Tags:148-135-121-165exeuser-JAMESWT_MHT
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Allocates memory in foreign processes
Creates a thread in another existing process (thread injection)
Writes to foreign memory regions
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Yara signature match

Classification

  • System is w10x64
  • loaddll64.exe (PID: 7348 cmdline: loaddll64.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 7356 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7400 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 7432 cmdline: rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
        • sdiagnhost.exe (PID: 7460 cmdline: c:\windows\System32\sdiagnhost.exe MD5: 3A161A0124CE64840140D6A9943A5DD3)
          • conhost.exe (PID: 7532 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sdiagnhost.exe (PID: 7408 cmdline: c:\windows\System32\sdiagnhost.exe MD5: 3A161A0124CE64840140D6A9943A5DD3)
      • conhost.exe (PID: 7472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000003.00000002.3100684042.000001DFF8EE0000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x5b19:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
  • 0x90af:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
00000005.00000002.3100687201.00000264CA0E0000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x5b19:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
  • 0x90af:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
00000004.00000003.1292237579.000001E618988000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x5099:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
  • 0x862f:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
00000004.00000002.1292570457.0000005A5A9E2000.00000004.00000010.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x6899:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
00000000.00000002.2450460206.000000EE24142000.00000004.00000010.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x6e69:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
  • 0xa3ff:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
Click to see the 1 entries
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: BjLxqVU7m4.dllReversingLabs: Detection: 50%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.6% probability
Source: unknownHTTPS traffic detected: 148.135.121.165:443 -> 192.168.2.7:49699 version: TLS 1.2
Source: unknownHTTPS traffic detected: 148.135.121.165:443 -> 192.168.2.7:49700 version: TLS 1.2
Source: BjLxqVU7m4.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb&& source: sdiagnhost.exe, 00000003.00000002.3101557902.000001DFF9150000.00000004.00001000.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3101796777.000001DFFA933000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3101107214.00000264CA283000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3100928223.00000264CA250000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb source: sdiagnhost.exe, 00000003.00000002.3101557902.000001DFF9150000.00000004.00001000.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3101796777.000001DFFA933000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3101107214.00000264CA283000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3100928223.00000264CA250000.00000004.00001000.00020000.00000000.sdmp
Source: Joe Sandbox ViewJA3 fingerprint: 72a589da586844d7f0818ce684948eea
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: unknownTCP traffic detected without corresponding DNS query: 148.135.121.165
Source: global trafficHTTP traffic detected: GET /39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3 HTTP/1.1Connection: Keep-AliveContent-Type: text/plainUser-Agent: HCMUS-CTF BotnetHost: 148.135.121.165
Source: global trafficHTTP traffic detected: GET /39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3 HTTP/1.1Connection: Keep-AliveContent-Type: text/plainUser-Agent: HCMUS-CTF BotnetHost: 148.135.121.165
Source: sdiagnhost.exe, 00000003.00000003.1878124649.000001DFF903F000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3100846109.000001DFF903F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://148.135.121.165/
Source: sdiagnhost.exe, 00000003.00000003.1878124649.000001DFF903F000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3100846109.000001DFF903F000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000003.1876714389.00000264CA2FD000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3101489905.00000264CA2FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3
Source: sdiagnhost.exe, 00000003.00000003.1878209479.000001DFF9081000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000003.1877665240.000001DFF907F000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000003.1876779159.00000264CA341000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000003.1276315126.00000264CA33F000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3101780226.00000264CA342000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac30u0
Source: sdiagnhost.exe, 00000005.00000003.1876714389.00000264CA2FD000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3101489905.00000264CA2FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3e6p
Source: sdiagnhost.exe, 00000005.00000003.1876714389.00000264CA2FD000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3101489905.00000264CA2FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://148.135.121.165/r5J
Source: sdiagnhost.exe, 00000003.00000003.1878124649.000001DFF903F000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3100846109.000001DFF903F000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000003.1876714389.00000264CA2FD000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3101489905.00000264CA2FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://148.135.121.165:443/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
Source: unknownHTTPS traffic detected: 148.135.121.165:443 -> 192.168.2.7:49699 version: TLS 1.2
Source: unknownHTTPS traffic detected: 148.135.121.165:443 -> 192.168.2.7:49700 version: TLS 1.2

System Summary

barindex
Source: 00000003.00000002.3100684042.000001DFF8EE0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: 00000005.00000002.3100687201.00000264CA0E0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: 00000004.00000003.1292237579.000001E618988000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: 00000004.00000002.1292570457.0000005A5A9E2000.00000004.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: 00000000.00000002.2450460206.000000EE24142000.00000004.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: 00000000.00000003.2450321100.0000020E89DFC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: C:\Windows\System32\sdiagnhost.exeCode function: 3_2_000001DFF8EE75CD NtCreateSection,NtMapViewOfSection,VirtualAlloc,NtUnmapViewOfSection,NtMapViewOfSection,VirtualProtect,VirtualProtect,VirtualProtect,3_2_000001DFF8EE75CD
Source: C:\Windows\System32\sdiagnhost.exeCode function: 5_2_00000264CA0E75CD NtCreateSection,NtMapViewOfSection,VirtualAlloc,NtUnmapViewOfSection,NtMapViewOfSection,VirtualProtect,VirtualProtect,VirtualProtect,5_2_00000264CA0E75CD
Source: C:\Windows\System32\sdiagnhost.exeCode function: 3_2_000001DFF8EE75CD3_2_000001DFF8EE75CD
Source: C:\Windows\System32\sdiagnhost.exeCode function: 3_2_000001DFF8EE6DC53_2_000001DFF8EE6DC5
Source: C:\Windows\System32\sdiagnhost.exeCode function: 3_2_000001DFF8EEA8C53_2_000001DFF8EEA8C5
Source: C:\Windows\System32\sdiagnhost.exeCode function: 3_2_000001DFF8EE5ED13_2_000001DFF8EE5ED1
Source: C:\Windows\System32\sdiagnhost.exeCode function: 3_2_000001DFF8EE71953_2_000001DFF8EE7195
Source: C:\Windows\System32\sdiagnhost.exeCode function: 3_2_000001DFF8EE806D3_2_000001DFF8EE806D
Source: C:\Windows\System32\sdiagnhost.exeCode function: 3_2_000001DFFA9311C03_2_000001DFFA9311C0
Source: C:\Windows\System32\sdiagnhost.exeCode function: 5_2_00000264CA0E75CD5_2_00000264CA0E75CD
Source: C:\Windows\System32\sdiagnhost.exeCode function: 5_2_00000264CA0E6DC55_2_00000264CA0E6DC5
Source: C:\Windows\System32\sdiagnhost.exeCode function: 5_2_00000264CA0E806D5_2_00000264CA0E806D
Source: C:\Windows\System32\sdiagnhost.exeCode function: 5_2_00000264CA0E71955_2_00000264CA0E7195
Source: C:\Windows\System32\sdiagnhost.exeCode function: 5_2_00000264CA0E5ED15_2_00000264CA0E5ED1
Source: C:\Windows\System32\sdiagnhost.exeCode function: 5_2_00000264CA0EA8C55_2_00000264CA0EA8C5
Source: C:\Windows\System32\sdiagnhost.exeCode function: 5_2_00000264CA2811C05_2_00000264CA2811C0
Source: 00000003.00000002.3100684042.000001DFF8EE0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: 00000005.00000002.3100687201.00000264CA0E0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: 00000004.00000003.1292237579.000001E618988000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: 00000004.00000002.1292570457.0000005A5A9E2000.00000004.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: 00000000.00000002.2450460206.000000EE24142000.00000004.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: 00000000.00000003.2450321100.0000020E89DFC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: classification engineClassification label: mal72.evad.winDLL@12/0@0/1
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7356:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7472:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7532:120:WilError_03
Source: BjLxqVU7m4.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1
Source: BjLxqVU7m4.dllReversingLabs: Detection: 50%
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll"
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\sdiagnhost.exe c:\windows\System32\sdiagnhost.exe
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\sdiagnhost.exe c:\windows\System32\sdiagnhost.exe
Source: C:\Windows\System32\sdiagnhost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\sdiagnhost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\sdiagnhost.exe c:\windows\System32\sdiagnhost.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1Jump to behavior
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\sdiagnhost.exe c:\windows\System32\sdiagnhost.exeJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeSection loaded: dpapi.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: BjLxqVU7m4.dllStatic PE information: Image base 0x180000000 > 0x60000000
Source: BjLxqVU7m4.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: BjLxqVU7m4.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: BjLxqVU7m4.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: BjLxqVU7m4.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: BjLxqVU7m4.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: BjLxqVU7m4.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: BjLxqVU7m4.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: BjLxqVU7m4.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb&& source: sdiagnhost.exe, 00000003.00000002.3101557902.000001DFF9150000.00000004.00001000.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3101796777.000001DFFA933000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3101107214.00000264CA283000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3100928223.00000264CA250000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb source: sdiagnhost.exe, 00000003.00000002.3101557902.000001DFF9150000.00000004.00001000.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3101796777.000001DFFA933000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3101107214.00000264CA283000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3100928223.00000264CA250000.00000004.00001000.00020000.00000000.sdmp
Source: BjLxqVU7m4.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: BjLxqVU7m4.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: BjLxqVU7m4.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: BjLxqVU7m4.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: BjLxqVU7m4.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\sdiagnhost.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\loaddll64.exe TID: 7352Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Windows\System32\sdiagnhost.exe TID: 7456Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\sdiagnhost.exe TID: 7424Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\sdiagnhost.exe TID: 7516Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\sdiagnhost.exe TID: 7480Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\sdiagnhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\System32\sdiagnhost.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\sdiagnhost.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: sdiagnhost.exe, 00000003.00000003.1877851785.000001DFF9090000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000003.1878377128.000001DFF9090000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3101155052.000001DFF9092000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW5OKT
Source: sdiagnhost.exe, 00000005.00000003.1876714389.00000264CA2FD000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000003.1876957819.00000264CA310000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW ;4
Source: sdiagnhost.exe, 00000003.00000003.1877851785.000001DFF9090000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000003.1878124649.000001DFF903F000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000003.1878377128.000001DFF9090000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3101155052.000001DFF9092000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3100846109.000001DFF903F000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000003.1876571755.00000264CA34C000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000003.1876779159.00000264CA341000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000003.1276315126.00000264CA34C000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000003.1276315126.00000264CA33F000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3101780226.00000264CA342000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\loaddll64.exeMemory allocated: C:\Windows\System32\sdiagnhost.exe base: 1DFF8EE0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\rundll32.exeMemory allocated: C:\Windows\System32\sdiagnhost.exe base: 264CA0E0000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\System32\loaddll64.exeThread created: C:\Windows\System32\sdiagnhost.exe EIP: F8EE0000Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread created: C:\Windows\System32\sdiagnhost.exe EIP: CA0E0000Jump to behavior
Source: C:\Windows\System32\loaddll64.exeMemory written: C:\Windows\System32\sdiagnhost.exe base: 1DFF8EE0000Jump to behavior
Source: C:\Windows\System32\rundll32.exeMemory written: C:\Windows\System32\sdiagnhost.exe base: 264CA0E0000Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\sdiagnhost.exe c:\windows\System32\sdiagnhost.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1Jump to behavior
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\sdiagnhost.exe c:\windows\System32\sdiagnhost.exeJump to behavior
Source: C:\Windows\System32\sdiagnhost.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
311
Process Injection
1
Rundll32
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
21
Virtualization/Sandbox Evasion
LSASS Memory21
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)311
Process Injection
Security Account Manager2
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1563002 Sample: BjLxqVU7m4.dll Startdate: 26/11/2024 Architecture: WINDOWS Score: 72 30 Malicious sample detected (through community Yara rule) 2->30 32 Multi AV Scanner detection for submitted file 2->32 34 AI detected suspicious sample 2->34 9 loaddll64.exe 1 2->9         started        process3 signatures4 42 Writes to foreign memory regions 9->42 44 Allocates memory in foreign processes 9->44 46 Creates a thread in another existing process (thread injection) 9->46 12 cmd.exe 1 9->12         started        14 sdiagnhost.exe 1 9->14         started        17 conhost.exe 9->17         started        process5 dnsIp6 19 rundll32.exe 12->19         started        28 148.135.121.165, 443, 49699, 49700 ERI-ASUS Sweden 14->28 22 conhost.exe 14->22         started        process7 signatures8 36 Writes to foreign memory regions 19->36 38 Allocates memory in foreign processes 19->38 40 Creates a thread in another existing process (thread injection) 19->40 24 sdiagnhost.exe 1 19->24         started        process9 process10 26 conhost.exe 24->26         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
BjLxqVU7m4.dll50%ReversingLabsWin64.Exploit.DonutMarte
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://148.135.121.165/r5J0%Avira URL Cloudsafe
https://148.135.121.165:443/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac0%Avira URL Cloudsafe
https://148.135.121.165/0%Avira URL Cloudsafe
https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac30u00%Avira URL Cloudsafe
https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac30%Avira URL Cloudsafe
https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3e6p0%Avira URL Cloudsafe
No contacted domains info
NameMaliciousAntivirus DetectionReputation
https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3false
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
https://148.135.121.165/sdiagnhost.exe, 00000003.00000003.1878124649.000001DFF903F000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3100846109.000001DFF903F000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://148.135.121.165/r5Jsdiagnhost.exe, 00000005.00000003.1876714389.00000264CA2FD000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3101489905.00000264CA2FE000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://148.135.121.165:443/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeacsdiagnhost.exe, 00000003.00000003.1878124649.000001DFF903F000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3100846109.000001DFF903F000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000003.1876714389.00000264CA2FD000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3101489905.00000264CA2FE000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3e6psdiagnhost.exe, 00000005.00000003.1876714389.00000264CA2FD000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3101489905.00000264CA2FE000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac30u0sdiagnhost.exe, 00000003.00000003.1878209479.000001DFF9081000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000003.1877665240.000001DFF907F000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000003.1876779159.00000264CA341000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000003.1276315126.00000264CA33F000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3101780226.00000264CA342000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
148.135.121.165
unknownSweden
158ERI-ASUSfalse
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1563002
Start date and time:2024-11-26 11:42:00 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 14s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run name:Run with higher sleep bypass
Number of analysed new started processes analysed:20
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:BjLxqVU7m4.dll
renamed because original name is a hash value
Original Sample Name:4b7a85411716775d966284e879a6bda87feade4c9f40cb94ade6e217793e8a84.exe
Detection:MAL
Classification:mal72.evad.winDLL@12/0@0/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 15
  • Number of non-executed functions: 4
Cookbook Comments:
  • Found application associated with file extension: .dll
  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
  • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: BjLxqVU7m4.dll
No simulations
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
148.135.121.165Ne7qNMCeuy.exeGet hashmaliciousUnknownBrowse
    Q7I4ToJZ0R.exeGet hashmaliciousUnknownBrowse
      Ne7qNMCeuy.exeGet hashmaliciousUnknownBrowse
        Q7I4ToJZ0R.exeGet hashmaliciousUnknownBrowse
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          ERI-ASUSNe7qNMCeuy.exeGet hashmaliciousUnknownBrowse
          • 148.135.121.165
          Q7I4ToJZ0R.exeGet hashmaliciousUnknownBrowse
          • 148.135.121.165
          Ne7qNMCeuy.exeGet hashmaliciousUnknownBrowse
          • 148.135.121.165
          Q7I4ToJZ0R.exeGet hashmaliciousUnknownBrowse
          • 148.135.121.165
          la.bot.sh4.elfGet hashmaliciousUnknownBrowse
          • 150.132.118.42
          loligang.ppc.elfGet hashmaliciousMiraiBrowse
          • 147.214.206.40
          apep.x86.elfGet hashmaliciousMiraiBrowse
          • 131.168.79.136
          zgp.elfGet hashmaliciousMiraiBrowse
          • 148.135.186.71
          arm5.nn.elfGet hashmaliciousMirai, OkiruBrowse
          • 169.144.189.36
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          72a589da586844d7f0818ce684948eeaNe7qNMCeuy.exeGet hashmaliciousUnknownBrowse
          • 148.135.121.165
          Q7I4ToJZ0R.exeGet hashmaliciousUnknownBrowse
          • 148.135.121.165
          Ne7qNMCeuy.exeGet hashmaliciousUnknownBrowse
          • 148.135.121.165
          Q7I4ToJZ0R.exeGet hashmaliciousUnknownBrowse
          • 148.135.121.165
          LgigaSKsL6.exeGet hashmaliciousSmokeLoaderBrowse
          • 148.135.121.165
          file.exeGet hashmaliciousSmokeLoaderBrowse
          • 148.135.121.165
          mGFoU1INUk.exeGet hashmaliciousSmokeLoaderBrowse
          • 148.135.121.165
          uSIvID4Y7U.exeGet hashmaliciousSmokeLoaderBrowse
          • 148.135.121.165
          wBgwzVbZuV.exeGet hashmaliciousSmokeLoaderBrowse
          • 148.135.121.165
          No context
          No created / dropped files found
          File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
          Entropy (8bit):5.397375470102125
          TrID:
          • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
          • Win64 Executable (generic) (12005/4) 10.17%
          • Generic Win/DOS Executable (2004/3) 1.70%
          • DOS Executable Generic (2002/1) 1.70%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
          File name:BjLxqVU7m4.dll
          File size:494'592 bytes
          MD5:bd804dfa6fafa1917f83060a30f7f1d0
          SHA1:68cc23c6877806705588ceb6fec57d913a543c1d
          SHA256:4b7a85411716775d966284e879a6bda87feade4c9f40cb94ade6e217793e8a84
          SHA512:707556ba18b3489bf808cb1d019cd28d4c7bbce782507e402c225aaae19a84e2b440e037faa1f971138c4cf21687f3bedabc3841fc743e58a46df2e914e0af54
          SSDEEP:12288:m40yN1KHlD9FmE02qUlLno8shIvaLzSAOXR4DbT8miyK/AIT/D:m40ynslDGLtUlLno8gIyLzSAOXufT8mc
          TLSH:15B4AE8C63AD4A7CE525CA341C47A784B2F3BC4C9650EF7A1A947CA23D1F581F87A9D0
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......f.6i".X:".X:".X:i.[;'.X:i.];..X:i.\;(.X:2;[;+.X:2;\;,.X:2;];..X:i.Y;!.X:".Y:..X:i:Q;#.X:i:.:#.X:i:Z;#.X:Rich".X:........PE..d..
          Icon Hash:7ae282899bbab082
          Entrypoint:0x18005fe00
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x180000000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
          Time Stamp:0x67322CD2 [Mon Nov 11 16:12:02 2024 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:6
          OS Version Minor:0
          File Version Major:6
          File Version Minor:0
          Subsystem Version Major:6
          Subsystem Version Minor:0
          Import Hash:7ff3d1e87d95163015bce24ecab3c29c
          Instruction
          dec eax
          mov dword ptr [esp+08h], ebx
          dec eax
          mov dword ptr [esp+10h], esi
          push edi
          dec eax
          sub esp, 20h
          dec ecx
          mov edi, eax
          mov ebx, edx
          dec eax
          mov esi, ecx
          cmp edx, 01h
          jne 00007F4E78CED2F7h
          call 00007F4E78CEDA10h
          dec esp
          mov eax, edi
          mov edx, ebx
          dec eax
          mov ecx, esi
          dec eax
          mov ebx, dword ptr [esp+30h]
          dec eax
          mov esi, dword ptr [esp+38h]
          dec eax
          add esp, 20h
          pop edi
          jmp 00007F4E78CED190h
          int3
          int3
          int3
          inc eax
          push ebx
          dec eax
          sub esp, 20h
          dec eax
          mov ebx, ecx
          xor ecx, ecx
          call dword ptr [0000E1FFh]
          dec eax
          mov ecx, ebx
          call dword ptr [0000E1EEh]
          call dword ptr [0000E1F8h]
          dec eax
          mov ecx, eax
          mov edx, C0000409h
          dec eax
          add esp, 20h
          pop ebx
          dec eax
          jmp dword ptr [0000E1ECh]
          dec eax
          mov dword ptr [esp+08h], ecx
          dec eax
          sub esp, 38h
          mov ecx, 00000017h
          call dword ptr [0000E1E0h]
          test eax, eax
          je 00007F4E78CED2F9h
          mov ecx, 00000002h
          int 29h
          dec eax
          lea ecx, dword ptr [00018DF6h]
          call 00007F4E78CED4C2h
          dec eax
          mov eax, dword ptr [esp+38h]
          dec eax
          mov dword ptr [00018EDDh], eax
          dec eax
          lea eax, dword ptr [esp+38h]
          dec eax
          add eax, 08h
          dec eax
          mov dword ptr [00018E6Dh], eax
          dec eax
          mov eax, dword ptr [00018EC6h]
          dec eax
          mov dword ptr [00018D37h], eax
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x773840x28.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x7c0000xf8.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x7a0000x108c.pdata
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x7d0000x67c.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x75a300x38.rdata
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x758f00x140.rdata
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x6e0000x268.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x6c3910x6c400bb677fae1f916ec8f6b527bf7b97ac2cFalse0.4373894883083141data5.363101479126426IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x6e0000x9ba60x9c0052db703257b5aaa2998a36764458115cFalse0.42225060096153844zlib compressed data4.783106084134961IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x780000x1d7c0xc005f6274e895e20194e4daeab242f66ba8False0.15071614583333334DOS executable (block device driver)2.2457774802989823IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .pdata0x7a0000x108c0x1200549c54645e00ef4e6ad04d654e5f2bb1False0.4453125data5.060326050579461IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .rsrc0x7c0000xf80x2000deaaac3f0dc5653aa759e15c976e2c4False0.3359375data2.5312981004807127IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x7d0000x67c0x800fae7c8c79b00d77c9832e40025ac35edFalse0.4990234375data4.935308952064295IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_MANIFEST0x7c0600x91XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.8689655172413793
          DLLImport
          KERNEL32.dllWriteProcessMemory, CloseHandle, VirtualAllocEx, CreateRemoteThread, CreateProcessA, WriteConsoleW, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwindEx, RtlPcToFileHeader, RaiseException, InterlockedFlushSList, GetLastError, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, ExitProcess, GetModuleHandleExW, GetModuleFileNameW, HeapAlloc, HeapFree, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, LCMapStringW, GetProcessHeap, GetStdHandle, GetFileType, GetStringTypeW, HeapSize, HeapReAlloc, SetStdHandle, FlushFileBuffers, WriteFile, GetConsoleOutputCP, GetConsoleMode, SetFilePointerEx, CreateFileW
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          TimestampSource PortDest PortSource IPDest IP
          Nov 26, 2024 11:42:55.744107962 CET49699443192.168.2.7148.135.121.165
          Nov 26, 2024 11:42:55.744154930 CET44349699148.135.121.165192.168.2.7
          Nov 26, 2024 11:42:55.744246960 CET49699443192.168.2.7148.135.121.165
          Nov 26, 2024 11:42:55.745874882 CET49699443192.168.2.7148.135.121.165
          Nov 26, 2024 11:42:55.745891094 CET44349699148.135.121.165192.168.2.7
          Nov 26, 2024 11:42:55.748723030 CET49700443192.168.2.7148.135.121.165
          Nov 26, 2024 11:42:55.748823881 CET44349700148.135.121.165192.168.2.7
          Nov 26, 2024 11:42:55.748895884 CET49700443192.168.2.7148.135.121.165
          Nov 26, 2024 11:42:55.749773979 CET49700443192.168.2.7148.135.121.165
          Nov 26, 2024 11:42:55.749808073 CET44349700148.135.121.165192.168.2.7
          Nov 26, 2024 11:42:57.099767923 CET44349699148.135.121.165192.168.2.7
          Nov 26, 2024 11:42:57.099893093 CET49699443192.168.2.7148.135.121.165
          Nov 26, 2024 11:42:57.138814926 CET44349700148.135.121.165192.168.2.7
          Nov 26, 2024 11:42:57.138886929 CET49700443192.168.2.7148.135.121.165
          Nov 26, 2024 11:42:57.145385027 CET49699443192.168.2.7148.135.121.165
          Nov 26, 2024 11:42:57.145400047 CET44349699148.135.121.165192.168.2.7
          Nov 26, 2024 11:42:57.145636082 CET44349699148.135.121.165192.168.2.7
          Nov 26, 2024 11:42:57.148854017 CET49700443192.168.2.7148.135.121.165
          Nov 26, 2024 11:42:57.148881912 CET44349700148.135.121.165192.168.2.7
          Nov 26, 2024 11:42:57.149082899 CET44349700148.135.121.165192.168.2.7
          Nov 26, 2024 11:42:57.194308996 CET49699443192.168.2.7148.135.121.165
          Nov 26, 2024 11:42:57.194339991 CET49700443192.168.2.7148.135.121.165
          Nov 26, 2024 11:42:57.553790092 CET49700443192.168.2.7148.135.121.165
          Nov 26, 2024 11:42:57.595355988 CET44349700148.135.121.165192.168.2.7
          Nov 26, 2024 11:42:57.622183084 CET49699443192.168.2.7148.135.121.165
          Nov 26, 2024 11:42:57.663328886 CET44349699148.135.121.165192.168.2.7
          Nov 26, 2024 11:42:57.947935104 CET44349700148.135.121.165192.168.2.7
          Nov 26, 2024 11:42:57.948120117 CET44349700148.135.121.165192.168.2.7
          Nov 26, 2024 11:42:57.948188066 CET49700443192.168.2.7148.135.121.165
          Nov 26, 2024 11:42:57.949054956 CET49700443192.168.2.7148.135.121.165
          Nov 26, 2024 11:42:57.949084044 CET44349700148.135.121.165192.168.2.7
          Nov 26, 2024 11:42:57.949100018 CET49700443192.168.2.7148.135.121.165
          Nov 26, 2024 11:42:57.949106932 CET44349700148.135.121.165192.168.2.7
          Nov 26, 2024 11:42:58.074325085 CET44349699148.135.121.165192.168.2.7
          Nov 26, 2024 11:42:58.074410915 CET44349699148.135.121.165192.168.2.7
          Nov 26, 2024 11:42:58.074472904 CET49699443192.168.2.7148.135.121.165
          Nov 26, 2024 11:42:58.074687958 CET49699443192.168.2.7148.135.121.165
          Nov 26, 2024 11:42:58.074704885 CET44349699148.135.121.165192.168.2.7
          Nov 26, 2024 11:42:58.074718952 CET49699443192.168.2.7148.135.121.165
          Nov 26, 2024 11:42:58.074733019 CET44349699148.135.121.165192.168.2.7
          • 148.135.121.165
          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.749700148.135.121.1654437460C:\Windows\System32\sdiagnhost.exe
          TimestampBytes transferredDirectionData
          2024-11-26 10:42:57 UTC194OUTGET /39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3 HTTP/1.1
          Connection: Keep-Alive
          Content-Type: text/plain
          User-Agent: HCMUS-CTF Botnet
          Host: 148.135.121.165
          2024-11-26 10:42:57 UTC192INHTTP/1.1 200 OK
          Server: nginx/1.18.0 (Ubuntu)
          Date: Tue, 26 Nov 2024 10:42:57 GMT
          Content-Type: application/octet-stream
          Content-Length: 93
          Connection: close
          Content-Type: text/plain
          2024-11-26 10:42:57 UTC93INData Raw: 54 68 69 73 20 69 73 20 61 20 66 61 6b 65 20 43 32 20 73 65 72 76 65 72 20 74 68 61 74 20 67 69 76 65 73 20 79 6f 75 20 74 68 65 20 66 6c 61 67 2e 20 48 65 72 65 20 79 6f 75 20 67 6f 3a 20 48 43 4d 55 53 2d 43 54 46 7b 63 34 74 63 48 2d 6d 33 2d 31 66 2d 7c 5f 7c 2d 63 34 4e 7d
          Data Ascii: This is a fake C2 server that gives you the flag. Here you go: HCMUS-CTF{c4tcH-m3-1f-|_|-c4N}


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          1192.168.2.749699148.135.121.1654437408C:\Windows\System32\sdiagnhost.exe
          TimestampBytes transferredDirectionData
          2024-11-26 10:42:57 UTC194OUTGET /39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3 HTTP/1.1
          Connection: Keep-Alive
          Content-Type: text/plain
          User-Agent: HCMUS-CTF Botnet
          Host: 148.135.121.165
          2024-11-26 10:42:58 UTC192INHTTP/1.1 200 OK
          Server: nginx/1.18.0 (Ubuntu)
          Date: Tue, 26 Nov 2024 10:42:57 GMT
          Content-Type: application/octet-stream
          Content-Length: 93
          Connection: close
          Content-Type: text/plain
          2024-11-26 10:42:58 UTC93INData Raw: 54 68 69 73 20 69 73 20 61 20 66 61 6b 65 20 43 32 20 73 65 72 76 65 72 20 74 68 61 74 20 67 69 76 65 73 20 79 6f 75 20 74 68 65 20 66 6c 61 67 2e 20 48 65 72 65 20 79 6f 75 20 67 6f 3a 20 48 43 4d 55 53 2d 43 54 46 7b 63 34 74 63 48 2d 6d 33 2d 31 66 2d 7c 5f 7c 2d 63 34 4e 7d
          Data Ascii: This is a fake C2 server that gives you the flag. Here you go: HCMUS-CTF{c4tcH-m3-1f-|_|-c4N}


          Click to jump to process

          Click to jump to process

          Click to jump to process

          Target ID:0
          Start time:05:42:53
          Start date:26/11/2024
          Path:C:\Windows\System32\loaddll64.exe
          Wow64 process (32bit):false
          Commandline:loaddll64.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll"
          Imagebase:0x7ff6ad360000
          File size:165'888 bytes
          MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.2450460206.000000EE24142000.00000004.00000010.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000003.2450321100.0000020E89DFC000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          Reputation:high
          Has exited:true

          Target ID:1
          Start time:05:42:54
          Start date:26/11/2024
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff75da10000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:2
          Start time:05:42:54
          Start date:26/11/2024
          Path:C:\Windows\System32\cmd.exe
          Wow64 process (32bit):false
          Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1
          Imagebase:0x7ff78a900000
          File size:289'792 bytes
          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:3
          Start time:05:42:54
          Start date:26/11/2024
          Path:C:\Windows\System32\sdiagnhost.exe
          Wow64 process (32bit):false
          Commandline:c:\windows\System32\sdiagnhost.exe
          Imagebase:0x7ff7d5040000
          File size:40'448 bytes
          MD5 hash:3A161A0124CE64840140D6A9943A5DD3
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000003.00000002.3100684042.000001DFF8EE0000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          Reputation:low
          Has exited:false

          Target ID:4
          Start time:05:42:54
          Start date:26/11/2024
          Path:C:\Windows\System32\rundll32.exe
          Wow64 process (32bit):false
          Commandline:rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1
          Imagebase:0x7ff7b76c0000
          File size:71'680 bytes
          MD5 hash:EF3179D498793BF4234F708D3BE28633
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000004.00000003.1292237579.000001E618988000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000004.00000002.1292570457.0000005A5A9E2000.00000004.00000010.00020000.00000000.sdmp, Author: unknown
          Reputation:high
          Has exited:true

          Target ID:5
          Start time:05:42:54
          Start date:26/11/2024
          Path:C:\Windows\System32\sdiagnhost.exe
          Wow64 process (32bit):false
          Commandline:c:\windows\System32\sdiagnhost.exe
          Imagebase:0x7ff7d5040000
          File size:40'448 bytes
          MD5 hash:3A161A0124CE64840140D6A9943A5DD3
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000005.00000002.3100687201.00000264CA0E0000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          Reputation:low
          Has exited:false

          Target ID:6
          Start time:05:42:54
          Start date:26/11/2024
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff75da10000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:false

          Target ID:8
          Start time:05:42:54
          Start date:26/11/2024
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff75da10000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:false

          Reset < >

            Execution Graph

            Execution Coverage:11%
            Dynamic/Decrypted Code Coverage:7%
            Signature Coverage:40%
            Total number of Nodes:100
            Total number of Limit Nodes:5
            execution_graph 2587 1dff8ee6dc5 2610 1dff8ee8855 2587->2610 2590 1dff8ee8855 LoadLibraryA 2591 1dff8ee6e01 2590->2591 2592 1dff8ee8855 LoadLibraryA 2591->2592 2593 1dff8ee6e17 2592->2593 2594 1dff8ee6e29 VirtualAlloc 2593->2594 2595 1dff8ee6e42 2593->2595 2594->2595 2596 1dff8ee6e6e 2594->2596 2596->2595 2597 1dff8ee8855 LoadLibraryA 2596->2597 2598 1dff8ee6ee6 2597->2598 2598->2595 2600 1dff8ee6f3e 2598->2600 2648 1dff8ee85c5 2598->2648 2599 1dff8ee8855 LoadLibraryA 2599->2600 2600->2595 2600->2599 2602 1dff8ee6f7f 2600->2602 2602->2595 2609 1dff8ee6ffb 2602->2609 2652 1dff8ee5d15 2602->2652 2604 1dff8ee6fd1 2605 1dff8ee6fd5 2604->2605 2614 1dff8ee5e41 2604->2614 2605->2595 2605->2604 2609->2595 2623 1dff8ee75cd 2609->2623 2611 1dff8ee888c 2610->2611 2612 1dff8ee6dee 2611->2612 2666 1dff8ee6361 2611->2666 2612->2590 2615 1dff8ee85c5 LoadLibraryA 2614->2615 2616 1dff8ee5e5f 2615->2616 2617 1dff8ee86ad LoadLibraryA 2616->2617 2618 1dff8ee5e74 2617->2618 2619 1dff8ee5e7c VirtualProtect 2618->2619 2620 1dff8ee5ebe 2618->2620 2619->2620 2621 1dff8ee5e96 2619->2621 2620->2595 2620->2609 2622 1dff8ee5ea8 VirtualProtect 2621->2622 2622->2620 2624 1dff8ee7622 2623->2624 2625 1dff8ee76bd NtCreateSection 2624->2625 2627 1dff8ee76ec 2624->2627 2647 1dff8ee7e57 2624->2647 2625->2627 2625->2647 2626 1dff8ee7792 NtMapViewOfSection 2633 1dff8ee77e5 2626->2633 2627->2626 2627->2647 2628 1dff8ee7b40 VirtualAlloc 2634 1dff8ee7bee 2628->2634 2629 1dff8ee85c5 LoadLibraryA 2629->2633 2631 1dff8ee85c5 LoadLibraryA 2636 1dff8ee7ab1 2631->2636 2632 1dff8ee7cd1 VirtualProtect 2635 1dff8ee7de5 VirtualProtect 2632->2635 2643 1dff8ee7cfb 2632->2643 2633->2629 2633->2636 2637 1dff8ee86ad LoadLibraryA 2633->2637 2633->2647 2634->2632 2638 1dff8ee7c57 NtUnmapViewOfSection 2634->2638 2641 1dff8ee7e1b 2635->2641 2636->2628 2636->2631 2642 1dff8ee86ad LoadLibraryA 2636->2642 2637->2633 2639 1dff8ee7c6f NtMapViewOfSection 2638->2639 2638->2647 2639->2632 2639->2647 2640 1dff8ee7ddc 2640->2635 2641->2647 2680 1dff8ee8369 2641->2680 2642->2636 2643->2640 2645 1dff8ee7dae VirtualProtect 2643->2645 2645->2643 2647->2595 2650 1dff8ee85e3 2648->2650 2649 1dff8ee868e LoadLibraryA 2651 1dff8ee8696 2649->2651 2650->2649 2650->2651 2651->2598 2653 1dff8ee85c5 LoadLibraryA 2652->2653 2654 1dff8ee5d34 2653->2654 2655 1dff8ee5d3c 2654->2655 2656 1dff8ee86ad LoadLibraryA 2654->2656 2655->2604 2657 1dff8ee5d5b 2656->2657 2657->2655 2658 1dff8ee5d7e VirtualProtect 2657->2658 2658->2655 2659 1dff8ee5d9c 2658->2659 2660 1dff8ee5daa VirtualProtect 2659->2660 2661 1dff8ee86ad LoadLibraryA 2660->2661 2662 1dff8ee5dd2 2661->2662 2662->2655 2663 1dff8ee5ded VirtualProtect 2662->2663 2663->2655 2664 1dff8ee5e06 2663->2664 2665 1dff8ee5e14 VirtualProtect 2664->2665 2665->2655 2667 1dff8ee63a3 2666->2667 2669 1dff8ee643a 2666->2669 2667->2669 2670 1dff8ee6529 2667->2670 2669->2611 2673 1dff8ee656c 2670->2673 2675 1dff8ee6595 2670->2675 2671 1dff8ee85c5 LoadLibraryA 2672 1dff8ee65a5 2671->2672 2672->2669 2673->2672 2673->2675 2676 1dff8ee86ad 2673->2676 2675->2671 2675->2672 2677 1dff8ee881d 2676->2677 2678 1dff8ee86e3 2676->2678 2677->2673 2678->2677 2679 1dff8ee6529 LoadLibraryA 2678->2679 2679->2677 2683 1dff8ee83a5 2680->2683 2681 1dff8ee859f 2681->2647 2682 1dff8ee86ad LoadLibraryA 2682->2683 2683->2681 2683->2682 2684 1dff8ee5d84 VirtualProtect 2685 1dff8ee5d9c 2684->2685 2692 1dff8ee5d3c 2684->2692 2686 1dff8ee5daa VirtualProtect 2685->2686 2687 1dff8ee86ad LoadLibraryA 2686->2687 2688 1dff8ee5dd2 2687->2688 2689 1dff8ee5ded VirtualProtect 2688->2689 2688->2692 2690 1dff8ee5e06 2689->2690 2689->2692 2691 1dff8ee5e14 VirtualProtect 2690->2691 2691->2692 2693 1dffa9319dc 2694 1dffa9319f5 __scrt_release_startup_lock 2693->2694 2694->2693 2696 1dffa931a40 2694->2696 2697 1dffa931440 2694->2697 2699 1dffa931451 2697->2699 2698 1dffa9315ec SleepEx 2700 1dffa9315fe 2698->2700 2699->2698 2700->2694
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000003.00000002.3100684042.000001DFF8EE0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001DFF8EE0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_1dff8ee0000_sdiagnhost.jbxd
            Yara matches
            Similarity
            • API ID: SectionVirtual$ProtectView$AllocCreateLibraryLoadUnmap
            • String ID: @
            • API String ID: 491204081-2766056989
            • Opcode ID: c37129cb37b3c8bba6147fbaa10fd2a9893dc3c91af62d8663cd2f8e877685fb
            • Instruction ID: eece3efbb7162d3d8069d0163546368f598b1d0fa8c3eb0905b230e142753cb0
            • Opcode Fuzzy Hash: c37129cb37b3c8bba6147fbaa10fd2a9893dc3c91af62d8663cd2f8e877685fb
            • Instruction Fuzzy Hash: A072D471618B588BEB6DDF68C8857E973E1FB98300F15453ED88BC7281EB74EA428741

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 296 1dff8ee6dc5-1dff8ee6e1d call 1dff8ee8855 * 3 303 1dff8ee6e4f 296->303 304 1dff8ee6e1f-1dff8ee6e22 296->304 305 1dff8ee6e52-1dff8ee6e6d 303->305 304->303 306 1dff8ee6e24-1dff8ee6e27 304->306 306->303 307 1dff8ee6e29-1dff8ee6e40 VirtualAlloc 306->307 308 1dff8ee6e6e-1dff8ee6e99 call 1dff8ee8e35 call 1dff8ee8e55 307->308 309 1dff8ee6e42-1dff8ee6e49 307->309 315 1dff8ee6e9b-1dff8ee6ed0 call 1dff8ee8a55 call 1dff8ee88c9 308->315 316 1dff8ee6ed6-1dff8ee6eed call 1dff8ee8855 308->316 309->303 311 1dff8ee6e4b 309->311 311->303 315->316 327 1dff8ee7123-1dff8ee7134 315->327 316->303 322 1dff8ee6ef3-1dff8ee6ef4 316->322 323 1dff8ee6efa-1dff8ee6f00 322->323 325 1dff8ee6f3e-1dff8ee6f48 323->325 326 1dff8ee6f02 323->326 331 1dff8ee6f4a-1dff8ee6f65 call 1dff8ee8855 325->331 332 1dff8ee6f7f-1dff8ee6f88 325->332 328 1dff8ee6f04-1dff8ee6f06 326->328 329 1dff8ee7167-1dff8ee7188 call 1dff8ee8e55 327->329 330 1dff8ee7136-1dff8ee7140 327->330 335 1dff8ee6f08-1dff8ee6f0e 328->335 336 1dff8ee6f20-1dff8ee6f22 328->336 363 1dff8ee718e-1dff8ee7190 329->363 364 1dff8ee718a 329->364 330->329 337 1dff8ee7142-1dff8ee7160 call 1dff8ee8e55 330->337 352 1dff8ee6f67-1dff8ee6f6e 331->352 353 1dff8ee6f74-1dff8ee6f7d 331->353 333 1dff8ee6f8a-1dff8ee6f94 call 1dff8ee5ed1 332->333 334 1dff8ee6fa3-1dff8ee6fa6 332->334 333->327 354 1dff8ee6f9a-1dff8ee6fa1 333->354 334->327 343 1dff8ee6fac-1dff8ee6fb6 334->343 335->336 341 1dff8ee6f10-1dff8ee6f1e 335->341 336->325 344 1dff8ee6f24-1dff8ee6f3c call 1dff8ee85c5 336->344 337->329 341->328 341->336 349 1dff8ee6fb8-1dff8ee6fb9 343->349 350 1dff8ee6fc0-1dff8ee6fc7 343->350 344->323 349->350 355 1dff8ee6ffb-1dff8ee6fff 350->355 356 1dff8ee6fc9-1dff8ee6fca 350->356 352->327 352->353 353->331 353->332 354->350 359 1dff8ee7005-1dff8ee702e 355->359 360 1dff8ee70b3-1dff8ee70bb 355->360 362 1dff8ee6fcc call 1dff8ee5d15 356->362 359->327 376 1dff8ee7034-1dff8ee704e call 1dff8ee8e35 359->376 365 1dff8ee710d-1dff8ee7113 call 1dff8ee75cd 360->365 366 1dff8ee70bd-1dff8ee70c3 360->366 367 1dff8ee6fd1-1dff8ee6fd3 362->367 363->305 364->363 375 1dff8ee7118-1dff8ee711f 365->375 368 1dff8ee70da-1dff8ee70ec call 1dff8ee6b4d 366->368 369 1dff8ee70c5-1dff8ee70cb 366->369 371 1dff8ee6fd5-1dff8ee6fdc 367->371 372 1dff8ee6fe2-1dff8ee6fe5 call 1dff8ee5e41 367->372 386 1dff8ee70fe-1dff8ee710b call 1dff8ee65d9 368->386 387 1dff8ee70ee-1dff8ee70f9 call 1dff8ee7195 368->387 374 1dff8ee70cd-1dff8ee70d8 call 1dff8ee806d 369->374 369->375 371->327 371->372 383 1dff8ee6fea-1dff8ee6fec 372->383 374->375 375->327 379 1dff8ee7121 375->379 389 1dff8ee706a-1dff8ee70ae 376->389 390 1dff8ee7050-1dff8ee7053 376->390 379->379 383->355 388 1dff8ee6fee-1dff8ee6ff5 383->388 386->375 387->386 388->327 388->355 389->327 398 1dff8ee70b0-1dff8ee70b1 389->398 390->360 393 1dff8ee7055-1dff8ee7068 call 1dff8ee8bb9 390->393 393->398 398->360
            APIs
            Memory Dump Source
            • Source File: 00000003.00000002.3100684042.000001DFF8EE0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001DFF8EE0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_1dff8ee0000_sdiagnhost.jbxd
            Yara matches
            Similarity
            • API ID: AllocVirtual
            • String ID:
            • API String ID: 4275171209-0
            • Opcode ID: 4e8b8247e7cc9eb48ab3447efde51f251e79aa77b60fd31208de4e14b5e2697b
            • Instruction ID: 6c6f34d7f47a7b7a5912b96d7e7fe85d617f85174550bc2a556ce87361ac500f
            • Opcode Fuzzy Hash: 4e8b8247e7cc9eb48ab3447efde51f251e79aa77b60fd31208de4e14b5e2697b
            • Instruction Fuzzy Hash: 69C17372314A294BEB5CEBA8C8917E9B3D1FB94300F15413FD44BC3296DB68EA17C681

            Control-flow Graph

            Memory Dump Source
            • Source File: 00000003.00000002.3101761958.000001DFFA931000.00000020.10000000.00040000.00000000.sdmp, Offset: 000001DFFA931000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_1dffa931000_sdiagnhost.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a94a9a69f4a1ab2ff4704a3eed6c67e80d4683e942e9756375f98649269b46e2
            • Instruction ID: bcc707f488b8f93e26f9e79ed50c3744bee31fa38339b8475c519ced170c94c4
            • Opcode Fuzzy Hash: a94a9a69f4a1ab2ff4704a3eed6c67e80d4683e942e9756375f98649269b46e2
            • Instruction Fuzzy Hash: 3F71C47161CF484FDB58EF2898493AA77E5FB99304F10026EE44BC32A2DF74D9068785

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000003.00000002.3100684042.000001DFF8EE0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001DFF8EE0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_1dff8ee0000_sdiagnhost.jbxd
            Yara matches
            Similarity
            • API ID: ProtectVirtual$LibraryLoad
            • String ID:
            • API String ID: 895956442-0
            • Opcode ID: 8400098549b82502c2f5a9c421df171acaf346d87819800aa738181b0ab5da70
            • Instruction ID: 68888bd3ad6ffe0e40c6052e23b3c3726cedb273c88e36a47904d64a93dd177d
            • Opcode Fuzzy Hash: 8400098549b82502c2f5a9c421df171acaf346d87819800aa738181b0ab5da70
            • Instruction Fuzzy Hash: 4F319872318A184BD75CAB989C567AA73D9E7C4310F01057EA84FC32D9DD64DE0746C1

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000003.00000002.3100684042.000001DFF8EE0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001DFF8EE0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_1dff8ee0000_sdiagnhost.jbxd
            Yara matches
            Similarity
            • API ID: ProtectVirtual
            • String ID:
            • API String ID: 544645111-0
            • Opcode ID: 914d75a376068fc31bfbded977a9d44f63d4b8c845bdf52e5f4dfcb5cec16c11
            • Instruction ID: 8247b3fa3b9ae072068e4a67956dd4471d806368a20ff86f03427d9e57255684
            • Opcode Fuzzy Hash: 914d75a376068fc31bfbded977a9d44f63d4b8c845bdf52e5f4dfcb5cec16c11
            • Instruction Fuzzy Hash: 5E21817230CA284BDB68AB9CA8563A973D5E7C8710F11057EA84BC33DADD68DE034681

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000003.00000002.3101761958.000001DFFA931000.00000020.10000000.00040000.00000000.sdmp, Offset: 000001DFFA931000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_1dffa931000_sdiagnhost.jbxd
            Similarity
            • API ID: Sleep
            • String ID: HCMU
            • API String ID: 3472027048-1408108644
            • Opcode ID: f4d16d696d8258c7e4b693e4f7ba327b9e3cf8e69538a5a4c7d8dbeb5bf79d3d
            • Instruction ID: 81fbed9521d2a56f515d7a926087a7afe9555f3034a8b320d186687a9023e9ed
            • Opcode Fuzzy Hash: f4d16d696d8258c7e4b693e4f7ba327b9e3cf8e69538a5a4c7d8dbeb5bf79d3d
            • Instruction Fuzzy Hash: 60613932928F084BDF24AF2C94893EA72E5FF58314F60463EE45BD31E6D634D9868681

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 269 1dff8ee85c5-1dff8ee85e1 270 1dff8ee85fc-1dff8ee860b 269->270 271 1dff8ee85e3-1dff8ee85e7 269->271 273 1dff8ee860d-1dff8ee8632 270->273 274 1dff8ee8637-1dff8ee8649 270->274 271->270 272 1dff8ee85e9-1dff8ee85fa 271->272 272->270 272->271 273->274 275 1dff8ee864c-1dff8ee8653 274->275 276 1dff8ee868e-1dff8ee8693 LoadLibraryA 275->276 277 1dff8ee8655-1dff8ee8664 275->277 280 1dff8ee8696-1dff8ee86a5 276->280 278 1dff8ee8666-1dff8ee867f call 1dff8ee8e91 277->278 279 1dff8ee8681-1dff8ee8687 277->279 278->279 284 1dff8ee86a6-1dff8ee86a9 278->284 279->275 282 1dff8ee8689-1dff8ee868c 279->282 282->276 282->280 284->280
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000003.00000002.3100684042.000001DFF8EE0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001DFF8EE0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_1dff8ee0000_sdiagnhost.jbxd
            Yara matches
            Similarity
            • API ID: LibraryLoad
            • String ID: l
            • API String ID: 1029625771-2517025534
            • Opcode ID: 17942f13ed0cde813e798f87a7dfef04ab11e23e44ed8671c4d85ae2c9c13351
            • Instruction ID: 94a5c5ac4d4be9267b6d6d01345fdc60997094002f9998cddb59453680e504eb
            • Opcode Fuzzy Hash: 17942f13ed0cde813e798f87a7dfef04ab11e23e44ed8671c4d85ae2c9c13351
            • Instruction Fuzzy Hash: 9B31D471618AAA4FE759DF2CC044B61BBD5FBA9308F2556BDC0EBC7192DB64C8078701

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000003.00000002.3100684042.000001DFF8EE0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001DFF8EE0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_1dff8ee0000_sdiagnhost.jbxd
            Yara matches
            Similarity
            • API ID: ProtectVirtual$LibraryLoad
            • String ID:
            • API String ID: 895956442-0
            • Opcode ID: 2a6024b9db74f160a7b58b3b0515e351414b1f3c9a0cbad83c4302ef420070c7
            • Instruction ID: de3791c5968871356e945c92f8b5451f2e49e3b9397b4ddfe57ce8ef3a5b6243
            • Opcode Fuzzy Hash: 2a6024b9db74f160a7b58b3b0515e351414b1f3c9a0cbad83c4302ef420070c7
            • Instruction Fuzzy Hash: CC11A531318A184BDB98EB5898956AA73D5FBD8300F00057EAC4BC7299DE64DE428781
            Memory Dump Source
            • Source File: 00000003.00000002.3100684042.000001DFF8EE0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001DFF8EE0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_1dff8ee0000_sdiagnhost.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f830e609fe5cee47e6c16999e452ce305c1c12be961c10b305ce6362bf0b176d
            • Instruction ID: 91fdb5310af2459ff0c67c9b3e60d4a30be86a55eac14b473018b4257d2db374
            • Opcode Fuzzy Hash: f830e609fe5cee47e6c16999e452ce305c1c12be961c10b305ce6362bf0b176d
            • Instruction Fuzzy Hash: 6F52D1B26043119FE768CF94C845BABB7E5EF84710F05483EF98697281D7B8EA42CB51
            Memory Dump Source
            • Source File: 00000003.00000002.3100684042.000001DFF8EE0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001DFF8EE0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_1dff8ee0000_sdiagnhost.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 1d4d866763d3bed20dc280203f6102a30c73feaa7c60b621d7a564ee5d7695d8
            • Instruction ID: cf763b7b23f9092cfae65e31dc105798bb75cc8dd05d4fb9cd3049dd16f86b29
            • Opcode Fuzzy Hash: 1d4d866763d3bed20dc280203f6102a30c73feaa7c60b621d7a564ee5d7695d8
            • Instruction Fuzzy Hash: 6DE18471718A598BEB6C9F6898497EEB7E5FB58301F01422ED84BC3250DF74EA02C781
            Memory Dump Source
            • Source File: 00000003.00000002.3100684042.000001DFF8EE0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001DFF8EE0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_1dff8ee0000_sdiagnhost.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3e74d2aa687a79bc353c1e30e2761018af6d861ea5a8c8f1c92844b65f1d9ba9
            • Instruction ID: 63430b8b1b8048352d8803dd6ee04ff18d5ff899166b6075a1ea165f60d5ad7a
            • Opcode Fuzzy Hash: 3e74d2aa687a79bc353c1e30e2761018af6d861ea5a8c8f1c92844b65f1d9ba9
            • Instruction Fuzzy Hash: A0E15F71518A0C8FDB59EF28D8896EA77E1FF98300F04466EE84BC7155DF30E9568B81
            Memory Dump Source
            • Source File: 00000003.00000002.3100684042.000001DFF8EE0000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001DFF8EE0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_3_2_1dff8ee0000_sdiagnhost.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 55def3579c95d66bb74bd3e75744c244041454eda364e5e205e1004b0ebe1f4c
            • Instruction ID: b2f3ada05e4a45f7fbb8e7c6ee8fbcd4d36900374bb730b19aa802223ef6164b
            • Opcode Fuzzy Hash: 55def3579c95d66bb74bd3e75744c244041454eda364e5e205e1004b0ebe1f4c
            • Instruction Fuzzy Hash: 6CA13F71608A1C8FDB59EF68C889BDA77E5FB68315F10466FE44AC7160EB30D645CB80

            Execution Graph

            Execution Coverage:11%
            Dynamic/Decrypted Code Coverage:7.1%
            Signature Coverage:0%
            Total number of Nodes:99
            Total number of Limit Nodes:6
            execution_graph 2584 264ca2819dc 2585 264ca2819f5 __scrt_release_startup_lock 2584->2585 2585->2584 2587 264ca281a40 2585->2587 2588 264ca281440 2585->2588 2589 264ca281451 2588->2589 2590 264ca2815ec SleepEx 2589->2590 2591 264ca2815fe 2590->2591 2591->2585 2592 264ca0e5d84 VirtualProtect 2593 264ca0e5d9c 2592->2593 2600 264ca0e5d3c 2592->2600 2594 264ca0e5daa VirtualProtect 2593->2594 2601 264ca0e86ad 2594->2601 2597 264ca0e5ded VirtualProtect 2598 264ca0e5e06 2597->2598 2597->2600 2599 264ca0e5e14 VirtualProtect 2598->2599 2599->2600 2602 264ca0e5dd2 2601->2602 2603 264ca0e86e3 2601->2603 2602->2597 2602->2600 2603->2602 2605 264ca0e6529 2603->2605 2608 264ca0e6595 2605->2608 2610 264ca0e656c 2605->2610 2607 264ca0e86ad LoadLibraryA 2607->2610 2609 264ca0e65a5 2608->2609 2611 264ca0e85c5 2608->2611 2609->2602 2610->2607 2610->2608 2610->2609 2614 264ca0e85e3 2611->2614 2612 264ca0e868e LoadLibraryA 2613 264ca0e8696 2612->2613 2613->2609 2614->2612 2614->2613 2615 264ca0e6dc5 2638 264ca0e8855 2615->2638 2618 264ca0e8855 LoadLibraryA 2619 264ca0e6e01 2618->2619 2620 264ca0e8855 LoadLibraryA 2619->2620 2621 264ca0e6e17 2620->2621 2622 264ca0e6e29 VirtualAlloc 2621->2622 2636 264ca0e6e42 2621->2636 2624 264ca0e6e6e 2622->2624 2622->2636 2623 264ca0e8855 LoadLibraryA 2625 264ca0e6ee6 2623->2625 2624->2623 2624->2636 2626 264ca0e6f3e 2625->2626 2629 264ca0e85c5 LoadLibraryA 2625->2629 2625->2636 2627 264ca0e8855 LoadLibraryA 2626->2627 2628 264ca0e6f7f 2626->2628 2626->2636 2627->2626 2628->2636 2637 264ca0e6ffb 2628->2637 2676 264ca0e5d15 2628->2676 2629->2625 2631 264ca0e6fd1 2633 264ca0e6fd5 2631->2633 2642 264ca0e5e41 2631->2642 2633->2631 2633->2636 2637->2636 2651 264ca0e75cd 2637->2651 2639 264ca0e888c 2638->2639 2640 264ca0e6dee 2639->2640 2690 264ca0e6361 2639->2690 2640->2618 2643 264ca0e85c5 LoadLibraryA 2642->2643 2644 264ca0e5e5f 2643->2644 2645 264ca0e86ad LoadLibraryA 2644->2645 2646 264ca0e5e74 2645->2646 2647 264ca0e5ebe 2646->2647 2648 264ca0e5e7c VirtualProtect 2646->2648 2647->2636 2647->2637 2648->2647 2649 264ca0e5e96 2648->2649 2650 264ca0e5ea8 VirtualProtect 2649->2650 2650->2647 2652 264ca0e7622 2651->2652 2653 264ca0e76bd NtCreateSection 2652->2653 2655 264ca0e76ec 2652->2655 2675 264ca0e7e57 2652->2675 2653->2655 2653->2675 2654 264ca0e7792 NtMapViewOfSection 2661 264ca0e77e5 2654->2661 2655->2654 2655->2675 2656 264ca0e7b40 VirtualAlloc 2662 264ca0e7bee 2656->2662 2657 264ca0e85c5 LoadLibraryA 2657->2661 2659 264ca0e85c5 LoadLibraryA 2665 264ca0e7ab1 2659->2665 2660 264ca0e7cd1 VirtualProtect 2663 264ca0e7cfb 2660->2663 2664 264ca0e7de5 VirtualProtect 2660->2664 2661->2657 2661->2665 2667 264ca0e86ad LoadLibraryA 2661->2667 2661->2675 2662->2660 2668 264ca0e7c57 NtUnmapViewOfSection 2662->2668 2670 264ca0e7ddc 2663->2670 2673 264ca0e7dae VirtualProtect 2663->2673 2666 264ca0e7e1b 2664->2666 2665->2656 2665->2659 2671 264ca0e86ad LoadLibraryA 2665->2671 2666->2675 2694 264ca0e8369 2666->2694 2667->2661 2669 264ca0e7c6f NtMapViewOfSection 2668->2669 2668->2675 2669->2660 2669->2675 2670->2664 2671->2665 2673->2663 2675->2636 2677 264ca0e85c5 LoadLibraryA 2676->2677 2678 264ca0e5d34 2677->2678 2679 264ca0e5d3c 2678->2679 2680 264ca0e86ad LoadLibraryA 2678->2680 2679->2631 2681 264ca0e5d5b 2680->2681 2681->2679 2682 264ca0e5d7e VirtualProtect 2681->2682 2682->2679 2683 264ca0e5d9c 2682->2683 2684 264ca0e5daa VirtualProtect 2683->2684 2685 264ca0e86ad LoadLibraryA 2684->2685 2686 264ca0e5dd2 2685->2686 2686->2679 2687 264ca0e5ded VirtualProtect 2686->2687 2687->2679 2688 264ca0e5e06 2687->2688 2689 264ca0e5e14 VirtualProtect 2688->2689 2689->2679 2691 264ca0e643a 2690->2691 2692 264ca0e63a3 2690->2692 2691->2639 2692->2691 2693 264ca0e6529 LoadLibraryA 2692->2693 2693->2691 2697 264ca0e83a5 2694->2697 2695 264ca0e859f 2695->2675 2696 264ca0e86ad LoadLibraryA 2696->2697 2697->2695 2697->2696
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000005.00000002.3100687201.00000264CA0E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000264CA0E0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_264ca0e0000_sdiagnhost.jbxd
            Yara matches
            Similarity
            • API ID: SectionVirtual$ProtectView$AllocCreateLibraryLoadUnmap
            • String ID: @
            • API String ID: 491204081-2766056989
            • Opcode ID: c37129cb37b3c8bba6147fbaa10fd2a9893dc3c91af62d8663cd2f8e877685fb
            • Instruction ID: 5e4bb06893201af4cafc158ef6626e7c2f821c90ad2bd4efd127794c7ba3c690
            • Opcode Fuzzy Hash: c37129cb37b3c8bba6147fbaa10fd2a9893dc3c91af62d8663cd2f8e877685fb
            • Instruction Fuzzy Hash: 5272D830615B488FDB69EF29C8897A973E1FB99341F14452FD4CAC7381DB31E9829741

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 296 264ca0e6dc5-264ca0e6e1d call 264ca0e8855 * 3 303 264ca0e6e4f 296->303 304 264ca0e6e1f-264ca0e6e22 296->304 305 264ca0e6e52-264ca0e6e6d 303->305 304->303 306 264ca0e6e24-264ca0e6e27 304->306 306->303 307 264ca0e6e29-264ca0e6e40 VirtualAlloc 306->307 308 264ca0e6e42-264ca0e6e49 307->308 309 264ca0e6e6e-264ca0e6e99 call 264ca0e8e35 call 264ca0e8e55 307->309 308->303 310 264ca0e6e4b 308->310 315 264ca0e6e9b-264ca0e6ed0 call 264ca0e8a55 call 264ca0e88c9 309->315 316 264ca0e6ed6-264ca0e6eed call 264ca0e8855 309->316 310->303 315->316 325 264ca0e7123-264ca0e7134 315->325 316->303 321 264ca0e6ef3-264ca0e6ef4 316->321 323 264ca0e6efa-264ca0e6f00 321->323 326 264ca0e6f02 323->326 327 264ca0e6f3e-264ca0e6f48 323->327 328 264ca0e7136-264ca0e7140 325->328 329 264ca0e7167-264ca0e7188 call 264ca0e8e55 325->329 330 264ca0e6f04-264ca0e6f06 326->330 331 264ca0e6f7f-264ca0e6f88 327->331 332 264ca0e6f4a-264ca0e6f65 call 264ca0e8855 327->332 328->329 335 264ca0e7142-264ca0e7160 call 264ca0e8e55 328->335 359 264ca0e718e-264ca0e7190 329->359 360 264ca0e718a 329->360 336 264ca0e6f20-264ca0e6f22 330->336 337 264ca0e6f08-264ca0e6f0e 330->337 333 264ca0e6fa3-264ca0e6fa6 331->333 334 264ca0e6f8a-264ca0e6f94 call 264ca0e5ed1 331->334 347 264ca0e6f67-264ca0e6f6e 332->347 348 264ca0e6f74-264ca0e6f7d 332->348 333->325 344 264ca0e6fac-264ca0e6fb6 333->344 334->325 355 264ca0e6f9a-264ca0e6fa1 334->355 335->329 336->327 345 264ca0e6f24-264ca0e6f3c call 264ca0e85c5 336->345 337->336 343 264ca0e6f10-264ca0e6f1e 337->343 343->330 343->336 351 264ca0e6fc0-264ca0e6fc7 344->351 352 264ca0e6fb8-264ca0e6fb9 344->352 345->323 347->325 347->348 348->331 348->332 356 264ca0e6ffb-264ca0e6fff 351->356 357 264ca0e6fc9-264ca0e6fca 351->357 352->351 355->351 361 264ca0e70b3-264ca0e70bb 356->361 362 264ca0e7005-264ca0e702e 356->362 364 264ca0e6fcc call 264ca0e5d15 357->364 359->305 360->359 365 264ca0e710d-264ca0e7113 call 264ca0e75cd 361->365 366 264ca0e70bd-264ca0e70c3 361->366 362->325 377 264ca0e7034-264ca0e704e call 264ca0e8e35 362->377 367 264ca0e6fd1-264ca0e6fd3 364->367 375 264ca0e7118-264ca0e711f 365->375 369 264ca0e70da-264ca0e70ec call 264ca0e6b4d 366->369 370 264ca0e70c5-264ca0e70cb 366->370 372 264ca0e6fe2-264ca0e6fe5 call 264ca0e5e41 367->372 373 264ca0e6fd5-264ca0e6fdc 367->373 387 264ca0e70fe-264ca0e710b call 264ca0e65d9 369->387 388 264ca0e70ee-264ca0e70f9 call 264ca0e7195 369->388 370->375 376 264ca0e70cd-264ca0e70d8 call 264ca0e806d 370->376 379 264ca0e6fea-264ca0e6fec 372->379 373->325 373->372 375->325 380 264ca0e7121 375->380 376->375 389 264ca0e7050-264ca0e7053 377->389 390 264ca0e706a-264ca0e70ae 377->390 379->356 384 264ca0e6fee-264ca0e6ff5 379->384 380->380 384->325 384->356 387->375 388->387 389->361 394 264ca0e7055-264ca0e7068 call 264ca0e8bb9 389->394 390->325 397 264ca0e70b0-264ca0e70b1 390->397 394->397 397->361
            APIs
            Memory Dump Source
            • Source File: 00000005.00000002.3100687201.00000264CA0E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000264CA0E0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_264ca0e0000_sdiagnhost.jbxd
            Yara matches
            Similarity
            • API ID: AllocVirtual
            • String ID:
            • API String ID: 4275171209-0
            • Opcode ID: 4e8b8247e7cc9eb48ab3447efde51f251e79aa77b60fd31208de4e14b5e2697b
            • Instruction ID: 5ec13b506c80f57010abb1e91015d08e307e8fdba217b3073208122befc499b4
            • Opcode Fuzzy Hash: 4e8b8247e7cc9eb48ab3447efde51f251e79aa77b60fd31208de4e14b5e2697b
            • Instruction Fuzzy Hash: 73C1F730315E098BEB58FF29D4997A9B3D1FB95341F14056BD4CAC3386EB22EC869781

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000005.00000002.3100687201.00000264CA0E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000264CA0E0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_264ca0e0000_sdiagnhost.jbxd
            Yara matches
            Similarity
            • API ID: ProtectVirtual$LibraryLoad
            • String ID:
            • API String ID: 895956442-0
            • Opcode ID: 8400098549b82502c2f5a9c421df171acaf346d87819800aa738181b0ab5da70
            • Instruction ID: 12c90d8d32a192872ceec36fadf41904cfc5062fb4fb13d230a502db937fc8ad
            • Opcode Fuzzy Hash: 8400098549b82502c2f5a9c421df171acaf346d87819800aa738181b0ab5da70
            • Instruction Fuzzy Hash: AB31B63131CA084BD768BE59985936A73D9E7C5360F00066FA8CFC33CAED65ED4696C1

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000005.00000002.3100687201.00000264CA0E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000264CA0E0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_264ca0e0000_sdiagnhost.jbxd
            Yara matches
            Similarity
            • API ID: ProtectVirtual
            • String ID:
            • API String ID: 544645111-0
            • Opcode ID: 914d75a376068fc31bfbded977a9d44f63d4b8c845bdf52e5f4dfcb5cec16c11
            • Instruction ID: c77e0210959572d47ffbd33d19294a9e693adb4a4fd8bedf6d11e8f5d3dd515b
            • Opcode Fuzzy Hash: 914d75a376068fc31bfbded977a9d44f63d4b8c845bdf52e5f4dfcb5cec16c11
            • Instruction Fuzzy Hash: 47218E3130CA084BDB68BE5DA85936973D9E7C8760F10056BA8CBC33CADD25ED464682

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000005.00000002.3101043223.00000264CA281000.00000020.10000000.00040000.00000000.sdmp, Offset: 00000264CA281000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_264ca281000_sdiagnhost.jbxd
            Similarity
            • API ID: Sleep
            • String ID: HCMU
            • API String ID: 3472027048-1408108644
            • Opcode ID: f4d16d696d8258c7e4b693e4f7ba327b9e3cf8e69538a5a4c7d8dbeb5bf79d3d
            • Instruction ID: 32772b88568f0da5587e5b15e2bc08cce69ec6ac87654effae34f1673221beb8
            • Opcode Fuzzy Hash: f4d16d696d8258c7e4b693e4f7ba327b9e3cf8e69538a5a4c7d8dbeb5bf79d3d
            • Instruction Fuzzy Hash: 19612932929E184BEB08BF29949D7E973D1FB58310F50465BF89AC33D6DA35D8C08782

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 269 264ca0e85c5-264ca0e85e1 270 264ca0e85e3-264ca0e85e7 269->270 271 264ca0e85fc-264ca0e860b 269->271 270->271 272 264ca0e85e9-264ca0e85fa 270->272 273 264ca0e860d-264ca0e8632 271->273 274 264ca0e8637-264ca0e8649 271->274 272->270 272->271 273->274 275 264ca0e864c-264ca0e8653 274->275 276 264ca0e868e-264ca0e8693 LoadLibraryA 275->276 277 264ca0e8655-264ca0e8664 275->277 278 264ca0e8696-264ca0e86a5 276->278 279 264ca0e8681-264ca0e8687 277->279 280 264ca0e8666-264ca0e867f call 264ca0e8e91 277->280 279->275 281 264ca0e8689-264ca0e868c 279->281 280->279 284 264ca0e86a6-264ca0e86a9 280->284 281->276 281->278 284->278
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000005.00000002.3100687201.00000264CA0E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000264CA0E0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_264ca0e0000_sdiagnhost.jbxd
            Yara matches
            Similarity
            • API ID: LibraryLoad
            • String ID: l
            • API String ID: 1029625771-2517025534
            • Opcode ID: 17942f13ed0cde813e798f87a7dfef04ab11e23e44ed8671c4d85ae2c9c13351
            • Instruction ID: 9f0ceea8b1ee75a17cbe41fe775e884e27d3754f9d9cd600c84f31dd8a5fb694
            • Opcode Fuzzy Hash: 17942f13ed0cde813e798f87a7dfef04ab11e23e44ed8671c4d85ae2c9c13351
            • Instruction Fuzzy Hash: E431E430519B854FE795EF2DC048B21BBD5FBAA348F2456BEC0DAC7292DB21C84A8701

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000005.00000002.3100687201.00000264CA0E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000264CA0E0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_5_2_264ca0e0000_sdiagnhost.jbxd
            Yara matches
            Similarity
            • API ID: ProtectVirtual$LibraryLoad
            • String ID:
            • API String ID: 895956442-0
            • Opcode ID: 2a6024b9db74f160a7b58b3b0515e351414b1f3c9a0cbad83c4302ef420070c7
            • Instruction ID: 3db14810afe46603b5a534794cd3504fac335b1beea72d6d446abcff660160a0
            • Opcode Fuzzy Hash: 2a6024b9db74f160a7b58b3b0515e351414b1f3c9a0cbad83c4302ef420070c7
            • Instruction Fuzzy Hash: D111A531718B084BDB98FF19989966A73D5FBD9340F00056BAC8AC7349DE21DD858781